beautypg.com

Google Search Appliance Security User Manual

Page 6

background image


6

Use the following table to model each content source. Include information about security in the Security
Mechanisms field.

System Info

Name of the system, and underlying product name

Description

More description

Content Type

For example, are they office documents, web pages? database records?

Content Size

Document count—smaller content size could mean that late binding for
serve time authorization might be OK

Serve time
authentication

Is the content server using Windows Integrated Authentication?

Is the content server integrated with an SSO system?

If the content server has its own user directory in either database or LDAP, are
the user names synced with the company wide directory?

Serve time
authorization

How responsive is the content server? If it’s not responsive, late binding is
probably out of the question.

Are the permissions on the documents fairly open, or very restrictive? If very
restrictive, later binding is probably out of the question.

Is there an API that can tell whether a user has access to a list of documents
given the user name and document IDs? If there is such an API, connector or
SAML authorization will be possible

Is there a way to find out what groups/roles/users have access to each
document? If the answer is “Yes,” then ACL authorization is most likely the
preferred approach.